Netiq Identity Manager: Driver For Identity Governance Implementation Guide
Netiq Identity Manager: Driver For Identity Governance Implementation Guide
Contents 3
4
About this Book and the Library
This guide explains how to install and configure the Identity Manager Driver for NetIQ Identity
Governance, formerly known as NetIQ Access Review.
Intended Audience
This book provides information for individuals responsible for understanding administration concepts
for roles and resource management across the enterprise, and implementing a secure, distributed
administration model.
We are a global, enterprise software company, with a focus on the three persistent challenges in your
environment: Change, complexity and risk—and how we can help you control them.
Our Viewpoint
Adapting to change and managing complexity and risk are nothing new
In fact, of all the challenges you face, these are perhaps the most prominent variables that deny
you the control you need to securely measure, monitor, and manage your physical, virtual, and
cloud computing environments.
Our Philosophy
Selling intelligent solutions, not just software
In order to provide reliable control, we first make sure we understand the real-world scenarios in
which IT organizations like yours operate—day in and day out. That's the only way we can
develop practical, intelligent IT solutions that successfully yield proven, measurable results. And
that's so much more rewarding than simply selling software.
Our Solutions
Identity & Access Governance
Access Management
Security Management
Systems & Application Management
Workload Management
Service Management
Worldwide: www.netiq.com/about_netiq/officelocations.asp
Email: [email protected]
Website: www.netiq.com
Worldwide: www.netiq.com/support/contactinfo.asp
Email: [email protected]
Website: www.netiq.com/support
Driver
The Identity Manager Driver for Identity Governance, formerly known as Access Review allows
you to provision application-specific permission catalog data from Identity Governance to Identity
Manager. This gives you the ability to review and certify permission assignments using Identity
Governance, as well as to request and provision these permissions using Identity Manager. The
driver also can provision users in the Identity Vault for Identity Manager as needed for the customer’s
use-case.
Identity Manager
When receiving the data from the Identity Governance driver, Identity Manager populates the
Identity Vault with the user identities and adds account and permission information to the identity
applications catalog. Because Identity Governance collects data from more sources than might
be connected to Identity Manager, the catalog now has identities, permissions, and accounts that
represent a larger picture of your identity and access environment.
In the catalog, Identity Manager administrators can create roles and permissions associated with
the application sources that Identity Governance collected. Then users can manage their unified
identity and request access to other resources in the catalog even if those applications are not
directly connected to Identity Manager. To process user requests, administrators can configure
workflows. You can also use workflows to fulfill the change requests generated by a review in
Identity Governance.
For more information about using Identity Governance, see the NetIQ Identity Governance
documentation site. For more information about Identity Manager, see the NetIQ Identity Manager
documentation site.
Installation Requirements
The Identity Governance driver requires the following applications and files, at a minimum. When you
installed Identity Manager, you might also have chosen to install the files for the Identity Governance
driver.
Governance Driver
The installation and configuration process for the Identity Manager driver for Identity Governance,
formerly known as Access Review, requires access to the Identity Governance server, Identity
Manager Remote Loader, and Designer for Identity Manager. This guide makes the following
assumptions:
Identity Governance is not installed on the same server as the Identity Manager engine or the
identity applications.
The Identity Governance driver is installed with the Identity Manager Remote Loader on the
same server as Identity Governance.
Ensure that you have activated Identity Manager. You do not need to separately activate the Identity
Governance driver.
Checklist Items
1. Review the considerations for installing and configuring the Identity Governance driver. For
more information, see “Information Needed for Installation and Configuration” on page 12.
2. Ensure that your environment meets the requirements for installing and configuring the
Identity Governance driver. For more information, see “Planning to Install and Configure the
Driver” on page 11.
3. Install the Remote Loader and the driver files on the Identity Governance server. For more
information, see “Installing the Remote Loader and Driver Files” on page 14.
4. Ensure that the Identity Governance driver can perform provisioning tasks in the identity
applications. For more information, see “Creating an Identity Manager Provisioning Service
Account for the Driver” on page 15.
5. Ensure that you have the appropriate packages installed and imported for the Identity
Governance driver, User Application driver, and notifications object in Designer. For more
information, see “Updating the Base Package for the Identity Governance Driver” on page 16.
6. Configure the basic settings for the Identity Governance driver. For more information, see
“Configuring the Identity Governance Driver” on page 16.
7. Apply the system account that you created in the identity application for the driver. For more
information, see “Adding the Driver Account to the Identity Governance Driver” on page 19.
8. Deploy the updated Identity Governance driver, User Application driver, and notifications
object. For more information, see “Deploying the Identity Governance Driver and Supporting
Objects” on page 19.
9. Ensure that Identity Governance can integrate collected permissions and permission
assignment tasks with the role and resource catalog in Identity Manager. For more
information, see “Configuring Identity Governance” on page 19.
For more information about installation, see “Installing and Managing the Remote Loader” in the
NetIQ Identity Manager Setup Guide.
For more information about classpaths, see “Installing and Managing the Remote Loader” in the
NetIQ Identity Manager Setup Guide.
5 Note the port number associated with the Remote Loader instance. You need this value when
configuring the driver in Designer.
“Updating the Base Package for the Identity Governance Driver” on page 16
“Configuring the Identity Governance Driver” on page 16
“Adding the Driver Account to the Identity Governance Driver” on page 19
“Deploying the Identity Governance Driver and Supporting Objects” on page 19
1 Open Designer.
2 Select Help > Check for Package Updates.
3 Select the updated packages that you want to update, including packages for the User
Application driver and notification templates.
4 Click Yes.
5 When the update completes, restart Designer.
The driver interacts with Identity Governance through database views. It uses the Identity
Governance administrator account as well as an account in the Identity Manager identity applications.
When configuring the driver, you need information about Identity Governance and Identity Manager
settings. For more information about required settings, see “Information Needed for Installation and
Configuration” on page 12.
NOTE: The Identity Governance driver requires the driver set packages for common settings:
NOVLACOMSET and NOVLCOMSET. Ensure that you import these packages before configuring the driver.
For more information about the packages, see “Installation Requirements” on page 11.
NOTE: Identity Manager shares Global Configuration Values (GCVs) with the entire driver set, the
Role and Resource driver, and the Identity Governance driver. NetIQ recommends that you
periodically review the GCVs to ensure that it does not get reset by installations of other drivers or
changes to the Identity Governance driver.
1 In the Modeler or Outline view of Designer, right-click the Identity Governance driver.
2 Select Live > Deploy if this is a new driver.
or
Select Live > Compare > Update eDirectory > Reconcile if this is an existing driver.
3 Select Live > Compare > Update > eDirectory > Reconcile the User Application driver.
4 Select Live > Compare > Update eDirectory > Reconcile the Default Notification Collection
object.
5 (Conditional) If Identity Manager requests Security Equivalences values, set equivalence to the
admin.sa.system user.
For more information, see “Integrating Collected Data with identity Manager” in the NetIQ Identity
Governance Administrator Guide.
The driver shim files are updated when you update the Remote Loader on the server.
Upgrade Procedure
The driver upgrade process involves upgrading the installed driver packages and updating the driver
files. The driver patch file contains the software to update the driver files. Currently, no new versions
are available for the driver.
You can configure a secure connection for communication among the Identity Manager Driver for
Identity Governance, formerly known as Access Review, Identity Governance, and Identity Manager.
5 To remove the passphrase so the server can start the postmaster automatically, enter the
following command:
6 To convert the certificate into a self-signed certificate, enter the following command:
openssl req -x509 -in cert.req -text -key cert.pem -out cert.cert
7 Copy the following files to the data directory of the PostgreSQL installation:
cp cert.pem $PGDATA/server.key
cp cert.cert $PGDATA/server.crt
where $PGDATA = /opt/netiq/idm/apps/postgresql/data/
8 To change the permission of the files, navigate to the /opt/netiq/idm/apps/postgresql/data/
directory and enter the following commands:
ssl=on
ssl_cert_file = '/opt/netiq/idm/apps/postgresql/data/server.crt' # (change
requires restart)
ssl_key_file = '/opt/netiq/idm/apps/postgresql/data/server.key' # (change
requires restart)
psql (9.0.3)
SSL connection (cipher: DHE-RSA-AES256-SHA, bits: 256)
Type "help" for help.
13 Add the server.crt that you created in Step 7 on page 24 to the cacert. For example, enter
the following command:
14 Start Tomcat.
15 Ensure that you update the Identity Governance databases to recognize the secured connection.
For more information, see “Enabling the Identity Governance Databases for SSL
Communication” on page 26.
su –oracle
owm
./sign-server-cert.sh CerReq
su – oracle
netmgr
lsnrctl stop
lsnrctl start
17 Ensure that you update the Identity Governance databases to recognize the secured connection.
For more information, see “Enabling the Identity Governance Databases for SSL
Communication” on page 26.
/etc/init.d/idmapps_tomcat_init stop
4 Add the SSL server certificate that you created for the database platform to the cacert. For
example:
PostgreSQL
keytool -import -trustcacerts -alias ar -file server.crt -keystore /opt/
netiq/idm/apps/jre/lib/security/cacerts
Oracle
keytool -import -trustcacerts -alias aroracle -file ca.crt -keystore /opt/
netiq/idm/apps/jre/lib/security/cacerts
5 In a text editor, open the server.xml file.
/etc/ini.d/idmapps_tomcat_init start
1 Log in to the server where you installed the Identity Governance driver and the Remote Loader.
2 Stop the Remote Loader. For example, enter the following command:
3 In a text editor, open the Remote Loader conf file for the driver, by default ARshim.conf.
4 Add the content of the SSL server certificate to the file. For example:
PostgreSQL
-description ARDriver
-commandport 8000
-connection "port=8090 rootfile=path/server.crt"
-trace 5
-tracefile "/opt/netiq/ar.log"
-tracefilemax 100M
-class "com.novell.nds.dirxml.driver.arshim.AccessReviewDriverShim"
Oracle
-description ARDriver
-commandport 8000
-connection "port=8090 rootfile=path/ca.crt"
-trace 5
-tracefile /tmp/remoteloader.log
-class com.novell.nds.dirxml.driver.arshim.AccessReviewDriverShim
8 In the AR Driver configuration, verify that the setting for Identity Governance Database
Connection URL resembles one of the following values:
PostgreSQL
url="jdbc:postgresql://hostname:5432/database_username?ssl=true"
Oracle
jdbc:oracle:thin:@(DESCRIPTION =(ADDRESS = (PROTOCOL = TCPS)(HOST =
hostname)(PORT = 2484))(CONNECT_DATA =(SERVER = DEDICATED) (SERVICE_NAME =
name))(SECURITY=(SSL_SERVER_CERT_DN='CN=OracleDB,OU=IN,O=IN,L=IN,ST=IN,C=I
N')))
By default, the databases have the usernames arops, ardcs, and arwf.
9 Restart the Identity Governance driver.